CN101763593A - Method and device for realizing audit log of system - Google Patents

Method and device for realizing audit log of system Download PDF

Info

Publication number
CN101763593A
CN101763593A CN200910242788A CN200910242788A CN101763593A CN 101763593 A CN101763593 A CN 101763593A CN 200910242788 A CN200910242788 A CN 200910242788A CN 200910242788 A CN200910242788 A CN 200910242788A CN 101763593 A CN101763593 A CN 101763593A
Authority
CN
China
Prior art keywords
audit log
data
database table
write
log set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910242788A
Other languages
Chinese (zh)
Inventor
方国
尚枫
罗华永
王宇飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN200910242788A priority Critical patent/CN101763593A/en
Publication of CN101763593A publication Critical patent/CN101763593A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method and a device for realizing an audit log of a system. The method comprises the following steps of: judging an operation type in an authorization and authentication service processing class when a functional operation in an application system is executed, acquiring related information of the audit log, and recording the information into a preset audit log set; initiating an independent audit record thread, and tracking the audit log set by using the independent audit record thread; and writing data in the audit log set in a database table used for recording the audit log when a preset trigger condition is achieved. The method and the device can avoid modifying codes of all the service functional modules, and prevent an audit log record and service operation in the same thread from contending system resources and bringing pressure to performance of the system at the same time.

Description

A kind of method and device of realizing the system audit daily record
Technical field
The present invention relates to the transaction processing system field, particularly relate to a kind of method and device of realizing the system audit daily record.
Background technology
Continuous development along with infotech, the informatization of industry-by-industry has entered comprehensively to be carried out in a deep going way the stage, set up a large amount of application systems in fields such as office, E-Government, ecommerce, a lot of artificial work before informationization has replaced.
In application system, after a feature operation is performed, run into the situation that can not find operating personnel through regular meeting, need the many related personnel of inquiry just can find the operating personnel of last this feature operation of execution, efficient is very low.When the operation of mistake has brought the error in the work, need call to account, operating personnel may deny and denying recognition, and the Operation Log that the defective that system is provided with again often can't tracing system has brought certain trouble to management.Therefore, the design of application system need provide the record of the audit function of Operation Log, can register system in user's operation note, be convenient to tracking examination in the future and prevent to deny.
The implementation method of traditional audit log record: in each functional module of exploitation, each method begin the place and end respectively adds one section code, this section code is responsible for calling of this method is written in the log record.When intrasystem user carries out the correlation technique operation, can carry out the operation of relevant log processing successively, and then carry out the content of business operation.For the operation of log processing, needing the developer all to encode in advance in each method for operating traffic thereof could realize.
But,, therefore can influence system performance because each method all needs to add the code of log.In the executive system during any method, outside carrying out the business operation that needs, all need order to carry out the function of handling log record, the data persistence that comprises audit log all needs sequential processes, in same processing threads, can take the processing time, so just strengthen the time of system handles core business operation, the performance of system is brought influence.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of method and device of realizing the system audit daily record,
Can under the prerequisite that does not influence system performance, write down audit log.
For achieving the above object, the invention provides following scheme:
A kind of method that realizes the system audit daily record comprises:
When the feature operation in the execution application system, the type of decision operation is obtained the audit log relevant information in authorization identifying service processing class, and records in the audit log set of records ends that presets;
Initiate the independent auditing record thread, utilize described independent auditing record thread to follow the tracks of described audit log set of records ends; When reaching the trigger condition that presets, resolve the data in the described audit log set of records ends, and write the database table that is used for writing down audit log.
Preferably, described when reaching the trigger condition that presets, the data in the described audit log set are write the database table that is used for writing down audit log comprise:
When in the described audit log set data being arranged, the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
When the data clauses and subclauses in the described audit log set reach preset number, the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
When reaching the time of presetting, the data in the described audit log set are write the database table that is used for writing down audit log.
Preferably, also comprise:
The data of the database table that is used for writing down audit log will be write, from when described audit log set, removing.
Preferably, described operation types comprises granted access or attempts unauthorized operation.
Preferably, described audit log relevant information comprises operation user profile, action name and/or the running time of initiating operation.
A kind of device of realizing the system audit daily record comprises:
The audit log information record cell, when being used for the feature operation in carrying out application system, the type of decision operation is obtained the audit log relevant information in authorization identifying service processing class, and records in the audit log set of presetting;
Audit log information is preserved the unit, is used to initiate the independent auditing record thread, utilizes described independent auditing record thread to follow the tracks of described audit log set; When reaching the trigger condition that presets, the data in the described audit log set are write the database table that is used for writing down audit log.
Preferably, described audit log is preserved the unit and is comprised:
First preserves subelement, is used for when described audit log set has data the data in the described audit log set being write the database table that is used for writing down audit log;
Perhaps,
Second preserves subelement, is used for when the data clauses and subclauses of described audit log set reach preset number, and the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
The 3rd preserves subelement, is used for when reaching the time of presetting, and the data in the described audit log set are write the database table that is used for writing down audit log.
Preferably, also comprise:
Data remove the unit, are used for writing the data of the database table that is used to write down audit log, from removing when described audit log set.
Preferably, described operation types comprises granted access or attempts unauthorized operation.
Preferably, described audit log relevant information comprises operation user profile, action name and/or the running time of initiating operation.
According to specific embodiment provided by the invention, the invention discloses following technique effect:
The present invention can be distributed in the realization of record audit log relevant information in the authorization identifying service processing class, and other service code is not needed to invade, and so just can avoid the code of each business function module is all made amendment; Simultaneously, adopt an independent auditing record thread to be responsible for the data acquisition of follow-up auditing daily record, and the data parsing in the audit log set is written in the database table, do not influence the main thread operation of each functional module, therefore, also can avoid audit log record, business operation contention system resource under the same thread, bring pressure for the performance of system.
Description of drawings
Fig. 1 is the process flow diagram of the method that provides of the embodiment of the invention;
Fig. 2 is the process flow diagram of the other method that provides of the embodiment of the invention;
Fig. 3 is the schematic representation of apparatus that the embodiment of the invention provides.
Embodiment
For above-mentioned purpose of the present invention, feature and advantage can be become apparent more, the present invention is further detailed explanation below in conjunction with the drawings and specific embodiments.
Referring to Fig. 1, the method for the realization system audit daily record that the embodiment of the invention provides may further comprise the steps:
S101: when the feature operation in the execution application system, the type of decision operation is obtained the audit log relevant information in authorization identifying service processing class, and records in the audit log set of presetting;
Wherein, the pairing functional module of described authorization identifying service processing class is commonly called authorizes filtrator (promptly authorizing filtrator to realize authorizing the function of filtration by the method for calling authorization identifying service processing class), the feature operation that all users carry out operation system all needs through authorizing filtrator to authenticate, has only the authentication of having passed through to authorize filtrator, the user could carry out relevant operation to operation system, otherwise if authentication is not passed through, then operation will be rejected.
The embodiment of the invention is exactly to have utilized the These characteristics of authorizing filtrator, the realization of the user being handled audit log is distributed in the authorization identifying service processing class, that is to say, in original authorization identifying service processing class, add the code that is used to handle audit log, utilize the function of authorizing filtrator to finish the record audit log information.
Like this, in the user needs executive system during feature operation, can judge in the mandate filtrator of system at first whether the user who initiates operation has authority to carry out this operation, if registered the function that needs the record audit log, then will analyze this operation types (as whether being granted access, attempting unauthorized operation etc.) and relevant information, and this information will be recorded in the audit log set of records ends that presets.Wherein, described audit log relevant information comprises the relevant informations such as user profile, action name and/or running time of initiating this operation.
That is to say, when authorizing filtrator to judge whether the user has authority to carry out after certain operates, and can produce judged result, according to this result just can decision operation type.For example, when authorize that filtrator judges that the user will carry out be operating as the granted access operation time, can return the response message that allows visit, just can get access to this time operation types according to this message is that granted access is operated; Equally, when being operating as of authorizing that filtrator judges that the user will carry out attempted unauthorized operation, can return the response message of disable access, just can get access to this time operation types for attempting unauthorized operation according to this message.
Introduce below and how to obtain the audit log relevant information.
It is that operation user's user profile is used to write down what initiate operation for which user.Because the user need use the request that can initiate to carry out feature operation after the user profile login system of registered in advance, therefore, can obtain operation user's user profile from user's log-on message.
Action name is used for recording user will carry out to the application system for which kind of operation.For the ease of the user application system is carried out various feature operations, the system development personnel can set in advance the URL that is used to carry out feature operation, and each URL is registered in the resource.When the user need carry out feature operation to the application system, the request (system can at first judge by authorizing filtrator to carry out authority after receiving this request) of corresponding URL can be initiated to have, action name can be had among the described URL to application system.For example, is certain URL user.cmd? method=insert, this URL just representative carries out insertion (insert) operation to user class (user), if the user need newly insert certain employee's a operation such as record in user class, then can send the request that has this URL.Just can obtain action name by resolving this URL.
Running time is used for the time that recording user is initiated operation, perhaps the time period from initiating to operate EO.All the time can obtain running time information by system.
Get access to after action type and the audit log relevant information, just these information can be recorded in the audit log set of records ends that presets, this audit log set of records ends is equivalent to a container in the JAVA class, the audit log inventory of each operation of record in container.
S102: initiate the independent auditing record thread, utilize described independent auditing record thread to follow the tracks of described audit log set; When reaching the trigger condition that presets, resolve the data in the described audit log set, and write the database table that is used for writing down audit log.
Get access to after the audit log relevant information, need be lastingly in database table, so that obtain the information of audit log by the mode of Query Database with these information.If in database table deposit data, operations such as database then need to conduct interviews.And in embodiments of the present invention, the process of obtaining audit log realizes in the authorization identifying service class, therefore, be the equal of in professional main thread, to carry out, process for fear of accessing database impacts the operation system main thread, the method that the embodiment of the invention adopts is: when application system starts, initiate an independent auditing record thread, the function of this thread is to be responsible for following the tracks of described audit log set, when reaching the trigger condition that presets, resolve the data in the described audit log set, and write the database table that is used for writing down audit log.
Wherein, concrete trigger condition can be set according to concrete application, for example can work as when finding in the audit log set data to be arranged, just with this data parsing and be written in the operation log recording database table; Perhaps, in the time of also can working as data clauses and subclauses in the set of described audit log and reach preset number (for example 10), the data in the described audit log set are write the database table that is used for writing down audit log in batch; Again or, can also regularly carry out the preservation of data, as when reaching the time of presetting, the data in the set of described audit log are write the database table that is used for writing down audit log.
Owing to may need timing or not timing ground that data in the audit log set are written to the database table that is used for writing down audit log, therefore, after certain the bar record in the audit log set is written to described database table, also need simultaneously this record to be removed from the audit log set, be repeated to record in the database table with the audit log of avoiding same operation.
As seen, in the embodiment of the invention, realize that the function of audit log is independent of other business function module, do not need other extra record and the preservation of encoding audit log of business function module; Be dispensed in the authorization identifying service processing class for the audit log function, other service code is not needed to invade; An independent auditing record thread is responsible for the data acquisition of follow-up auditing daily record, and the data parsing in the audit log set is written in the database table, so just can avoid the code of each business function module is all made amendment to finish the record of audit log, also can avoid simultaneously audit log preservation, business operation contention system resource under the same thread, bring pressure for the performance of system.
Need to prove, in the prior art, owing to need all need to increase the code that is used to realize audit log in each business function module, therefore implementation method is loaded down with trivial details, cause each business function module development amount to strengthen, code is readability not, and in a single day the developer forgets this partial code of adding in business function module, just lose the chance of revising, only write code again.And in the embodiment of the invention, the function of audit log record is independent of each business function module, the exploitation that the developer only need be absorbed in this business function module gets final product, audit log record for system does not need extra encoding process, code readability easy care, and reduced developer's workload.
Need to prove in addition, in the prior art, classification of type for audit log need be disposed in advance, such as need the information that login is relevant being written to a log sheet, again business operation is write an other log sheet, therefore, defy capture and record for the operation that does not have successful execution or carried out by system's refusal.And in the embodiment of the invention, because the authority filtrator in the audit log data from system, and each feature operation that the user carries out operation system all must be carried out pre-service by authorizing filtrator, therefore, can guarantee that each operation can both trackedly be audited in the system.
As fully visible, the process that realizes the system audit daily record in the embodiment of the invention as shown in Figure 2, at first, the audit log writing function is independent of other concrete business function module, and the code that does not need to invade business function module just can be finished the record of audit log; Secondly, the relevant information of audit log derives from the mandate of system and filters class, can guarantee that therefore intrasystem each feature operation can both trackedly audit, and can not produce the omission of audit log; At last, an independent auditing record thread is responsible for the record of follow-up auditing daily record, and the main thread of applied business operation not can not influence the performance of business operation.
The method of the realization system audit daily record that provides with the embodiment of the invention is corresponding, and the embodiment of the invention also provides a kind of device of realizing the system audit daily record, and referring to Fig. 3, this device comprises with lower unit:
Audit log information record cell U301, when being used for the feature operation in carrying out application system, the type of decision operation is obtained the audit log relevant information in authorization identifying service processing class, and records in the audit log set of presetting;
Audit log information is preserved unit U302, is used to initiate the independent auditing record thread, utilizes described independent auditing record thread to follow the tracks of described audit log set; When reaching the trigger condition that presets, the data in the described audit log set are write the database table that is used for writing down audit log.
By the device that the embodiment of the invention provides, realize that the function of audit log is independent of other business function module, do not need other extra record and the preservation of encoding audit log of business function module; Be dispensed in the authorization identifying service processing class for the audit log function, other service code is not needed to invade; An independent auditing record thread is responsible for the data acquisition of follow-up auditing daily record, and the data parsing in the audit log set is written in the database table, so just can avoid the code of each business function module is all made amendment to finish the record of audit log, also can avoid simultaneously audit log preservation, business operation contention system resource under the same thread, bring pressure for the performance of system.
Specifically with the audit log persistence time, can concrete trigger condition be set, carry out regularly or persistence aperiodically according to practical situations.Concrete, audit log is preserved unit U302 can comprise following subelement:
First preserves subelement, is used for when described audit log set has data the data in the described audit log set being write the database table that is used for writing down audit log;
Perhaps,
Second preserves subelement, is used for when the data clauses and subclauses of described audit log set reach preset number, and the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
The 3rd preserves subelement, is used for when reaching the time of presetting, and the data in the described audit log set are write the database table that is used for writing down audit log.
Restarted for fear of identical audit log record and to be saved in the database table, this device can also comprise:
Data remove the unit, are used for writing the data of the database table that is used to write down audit log, from removing when described audit log set.
Wherein, described operation types comprises granted access or attempts unauthorized operation.
Described audit log relevant information comprises operation user profile, action name and/or the running time of initiating operation.
More than to a kind of method and device of realizing the system audit daily record provided by the present invention, be described in detail, used specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, part in specific embodiments and applications all can change.In sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. a method that realizes the system audit daily record is characterized in that, comprising:
When the feature operation in the execution application system, the type of decision operation is obtained the audit log relevant information in authorization identifying service processing class, and records in the audit log set of records ends that presets;
Initiate the independent auditing record thread, utilize described independent auditing record thread to follow the tracks of described audit log set of records ends; When reaching the trigger condition that presets, resolve the data in the described audit log set of records ends, and write the database table that is used for writing down audit log.
2. method according to claim 1 is characterized in that, and is described when reaching the trigger condition that presets, and the data in the described audit log set write the database table that is used for writing down audit log comprise:
When in the described audit log set data being arranged, the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
When the data clauses and subclauses in the described audit log set reach preset number, the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
When reaching the time of presetting, the data in the described audit log set are write the database table that is used for writing down audit log.
3. method according to claim 1 is characterized in that, also comprises:
The data of the database table that is used for writing down audit log will be write, from when described audit log set, removing.
4. method according to claim 1 is characterized in that, described operation types comprises granted access or attempts unauthorized operation.
5. method according to claim 1 is characterized in that, described audit log relevant information comprises operation user profile, action name and/or the running time of initiating operation.
6. a device of realizing the system audit daily record is characterized in that, comprising:
The audit log information record cell, when being used for the feature operation in carrying out application system, the type of decision operation is obtained the audit log relevant information in authorization identifying service processing class, and records in the audit log set of presetting;
Audit log information is preserved the unit, is used to initiate the independent auditing record thread, utilizes described independent auditing record thread to follow the tracks of described audit log set; When reaching the trigger condition that presets, the data in the described audit log set are write the database table that is used for writing down audit log.
7. device according to claim 6 is characterized in that, described audit log is preserved the unit and comprised:
First preserves subelement, is used for when described audit log set has data the data in the described audit log set being write the database table that is used for writing down audit log;
Perhaps,
Second preserves subelement, is used for when the data clauses and subclauses of described audit log set reach preset number, and the data in the described audit log set are write the database table that is used for writing down audit log;
Perhaps,
The 3rd preserves subelement, is used for when reaching the time of presetting, and the data in the described audit log set are write the database table that is used for writing down audit log.
8. device according to claim 6 is characterized in that, also comprises:
Data remove the unit, are used for writing the data of the database table that is used to write down audit log, from removing when described audit log set.
9. device according to claim 6 is characterized in that, described operation types comprises granted access or attempts unauthorized operation.
10. device according to claim 6 is characterized in that, described audit log relevant information comprises operation user profile, action name and/or the running time of initiating operation.
CN200910242788A 2009-12-17 2009-12-17 Method and device for realizing audit log of system Pending CN101763593A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910242788A CN101763593A (en) 2009-12-17 2009-12-17 Method and device for realizing audit log of system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910242788A CN101763593A (en) 2009-12-17 2009-12-17 Method and device for realizing audit log of system

Publications (1)

Publication Number Publication Date
CN101763593A true CN101763593A (en) 2010-06-30

Family

ID=42494747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910242788A Pending CN101763593A (en) 2009-12-17 2009-12-17 Method and device for realizing audit log of system

Country Status (1)

Country Link
CN (1) CN101763593A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475535A (en) * 2013-08-23 2013-12-25 汉柏科技有限公司 Log management system of cloud computing server
CN104301360A (en) * 2013-07-19 2015-01-21 阿里巴巴集团控股有限公司 Method, log server and system for recording log data
CN106326085A (en) * 2016-08-16 2017-01-11 成都菜鸟网络技术有限公司 Auditing method for electric power information log
CN107003927A (en) * 2014-09-10 2017-08-01 布尔股份公司 High-performance mechanism for producing the log information on computer processes
CN107147721A (en) * 2017-05-17 2017-09-08 北京天地和兴科技有限公司 A kind of Audit data machining system of distributed deployment
CN107766408A (en) * 2017-08-31 2018-03-06 西安交大捷普网络科技有限公司 The storage method of audit log
CN110032879A (en) * 2018-01-11 2019-07-19 中标软件有限公司 A kind of safety certification and log audit method and system of user behavior
CN111800295A (en) * 2020-06-23 2020-10-20 四川虹美智能科技有限公司 Server audit management method, device and system
CN112882808A (en) * 2021-02-08 2021-06-01 上海弘积信息科技有限公司 Method for collecting and sending big data audit log of application delivery equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1858738A (en) * 2006-02-15 2006-11-08 华为技术有限公司 Method and device for access data bank
CN1864157A (en) * 2003-05-08 2006-11-15 国际商业机器公司 Autonomic logging support

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1864157A (en) * 2003-05-08 2006-11-15 国际商业机器公司 Autonomic logging support
CN1858738A (en) * 2006-02-15 2006-11-08 华为技术有限公司 Method and device for access data bank

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301360A (en) * 2013-07-19 2015-01-21 阿里巴巴集团控股有限公司 Method, log server and system for recording log data
CN104301360B (en) * 2013-07-19 2019-03-12 阿里巴巴集团控股有限公司 A kind of method of logdata record, log server and system
CN103475535A (en) * 2013-08-23 2013-12-25 汉柏科技有限公司 Log management system of cloud computing server
CN107003927A (en) * 2014-09-10 2017-08-01 布尔股份公司 High-performance mechanism for producing the log information on computer processes
CN106326085A (en) * 2016-08-16 2017-01-11 成都菜鸟网络技术有限公司 Auditing method for electric power information log
CN107147721A (en) * 2017-05-17 2017-09-08 北京天地和兴科技有限公司 A kind of Audit data machining system of distributed deployment
CN107766408A (en) * 2017-08-31 2018-03-06 西安交大捷普网络科技有限公司 The storage method of audit log
CN110032879A (en) * 2018-01-11 2019-07-19 中标软件有限公司 A kind of safety certification and log audit method and system of user behavior
CN110032879B (en) * 2018-01-11 2023-10-20 中标软件有限公司 User behavior security authentication and log audit method and system
CN111800295A (en) * 2020-06-23 2020-10-20 四川虹美智能科技有限公司 Server audit management method, device and system
CN112882808A (en) * 2021-02-08 2021-06-01 上海弘积信息科技有限公司 Method for collecting and sending big data audit log of application delivery equipment
CN112882808B (en) * 2021-02-08 2023-10-24 上海弘积信息科技有限公司 Method for collecting and transmitting big data audit log of application delivery equipment

Similar Documents

Publication Publication Date Title
CN101763593A (en) Method and device for realizing audit log of system
CN102891826B (en) The control method of web page access, equipment and system
RU2586866C2 (en) Differentiation of set of features of participant of leased medium and user
CN101582887B (en) Safety protection method, gateway device and safety protection system
CN108154047A (en) A kind of data desensitization method and device
CN109768961A (en) Wechat small routine login method, device and the storage medium led to based on an account
EP2405607A1 (en) Privilege management system and method based on object
US20160125189A1 (en) Row level security
US7895332B2 (en) Identity migration system apparatus and method
CN105786998A (en) Database middleware system and method for processing data through database middleware system
CN102077201A (en) System and method for dynamic and real-time categorization of webpages
CN102065147A (en) Method and device for obtaining user login information based on enterprise application system
Singh et al. Sql injection detection and correction using machine learning techniques
US10313371B2 (en) System and method for controlling and monitoring access to data processing applications
CN107748849A (en) A kind of authority control method and system based on NFS
US10057240B2 (en) Single sign-on to web applications from mobile devices
CN110895537A (en) Method and device for freely inquiring authority control
CN107025102B (en) Decision method and system based on rule file
CN103475546A (en) Method and system for detecting repeated login of salesmen
CN108234122A (en) Token method of calibration and device
CN109145621A (en) Document management method and device
CN106101125A (en) Authentication processing method, Apparatus and system
CN105430013A (en) Information access control method and information access control system
CN114861208A (en) Data authority control method and data authority control service
KR20050073349A (en) System for controlling database access based on 3-tier structure and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100630